Two Practical and Provably Secure Block Ciphers: BEARS and LION
暂无分享,去创建一个
[1] Bart Preneel,et al. Cryptographic hash functions , 2010, Eur. Trans. Telecommun..
[2] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[3] Ueli Maurer. A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator , 1992, EUROCRYPT.
[4] Gene Tsudik. Message authentication with one-way hash functions , 1992, CCRV.
[5] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[6] Phillip Rogaway,et al. A Software-Optimised Encryption Algorithm , 1993, FSE.
[7] Matthew J. B. Robshaw,et al. Fast Block Cipher Proposal , 1993, FSE.
[8] Ross J. Anderson. Solving a Class of Stream Ciphers , 1990, Cryptologia.
[9] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[10] U. Maurer. A Simpliied and Generalized Treatment of Luby-rackoo Pseudorandom Permutation Generators , 1992 .
[11] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[12] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.